Smartphones are everywhere these days. Almost every man, woman and child has a smartphone in their pocket at all times. We have come to rely heavily on these tiny devices as our calculators, sources of entertainment and our connections to the outside world. And as these devices become so much more personal, they also become prime targets for thieves and hackers. Those malicious muggers have come up with some incredibly clever ways to hack our most personal information by figuring out our four -digit passcodes and alphanumeric passwords. However, smartphone manufacturers like Apple and Samsung have come up with a way around this: fingerprint scanners. And for several years, these fingerprint scanners have helped keep our devices safe, but now, it seems as if we are moving towards a new trend in smartphone security: facial recognition.

I recently wrote a blog on how fingerprint scanners are not actually as safe as we believe. It seems as though smartphone manufacturers are taking this to heart and coming up with innovative new ways to scan our faces as the next level of security. The most recent phone to incorporate facial scanning technology is the Samsung Galaxy S8 and S8+. The technology is as straightforward as it sounds. You simply hold the phone up to your face and the phone’s camera reads your facial patterns and unlocks your phone. Unfortunately, the S8 and S8+ have been reported to have been fooled by a photo of its user’s face, which raises some concern for the legitimacy of the feature.

Even with this minor setback, that hasn’t stopped other smartphone manufacturers to work on implementing the same feature on their devices. For example, the highly-anticipated iPhone 8 is rumored to feature facial recognition technology as a means of securing the device. Rumors suggest that, in order to avoid a similar Galaxy S8/S8+ flaw, Apple is investing in 3D facial recognition that will be able to determine the depth of a face, as well as its two-dimensional characteristics.

What are your thoughts on this? Do you believe that technology companies should be focused on using facial recognition? Do you think fingerprint scanners are better? Before you answer, remember that fingerprint scanners were met with similar skepticism when they first hit the market. And once Apple had used it on the iPhone 5S, the technology had been given a certain amount of legitimacy. Could the same be happening for facial recognition? Only time will tell.

I’ve said it time and time again: technology is now a major part of our world. Our society as a whole has seen some major improvements and upgrades thanks to the overwhelming number of technological advances in recent years. One of the largest and most important technological upgrades to come along has been the introduction of the smartphone. While smartphones were not new when the iPhone came around in 2007, the very first of Apple’s high-tech smartphones helped push the product into the mainstream market. Soon after Apple had released the iPhone, another mobile operating system was making its way onto non-Apple smartphones: Android. And the rest, as they say, is history.

Android and iOS are the two most popular mobile operating systems on the planet, and they each have their own strengths and weaknesses. One favors simplicity and optimization of hardware and power, while the other excels in customization. But in today’s digital world, security is just as important as any other new age feature. But which operating system does it better?

Android

One of the most attractive aspects of the Android operating system is the fact that it is incredibly customizable. Not only can end users completely redesign their Android-operated phones with launchers, skins and wallpapers, but manufacturers, like Samsung and LG, can make their own versions of Android for their specific phones. Android phones also have a tendency to be popular with those who are incredibly familiar with technology, as they can take that customization even further by digging into the code of the operating system and create video game emulators and access free, and illegal, movies and music. The reason Android is so customizable is because it is an open source operating system. This means that anybody can have access to the code for the operating system. While this allows for a lot of creative freedom, it also creates some drawbacks, mainly in performance and security. Android has been host to several different viruses over the years, most recently the infamous StageFright virus. The StageFright virus allowed hackers to perform arbitrary actions remotely on any Android devices running on Android 2.2 or higher.

iOS

When it comes to safety and security, few names are as prevalent as Apple. Apple not only ensures maximum security on its iPhones, but also on its other products, like their Macs, iPads, Apple Watches and iPods. The reason iOS is able to offer a higher level of safety is because it is not an open source code. Apple keeps the source code kept hidden incredibly well and does not allow such easy access to third-party manufacturers. This coupled with the fact that Apple has an incredibly tight grip on its ecosystem and App Store, makes for an incredibly secure device. Features like Touch ID and Apple Pay allow you to store credit card and fingerprint information directly on the device, and although Android operating systems offer similar features, the devices are just not as secure. Now, that isn’t to say that iOS has never been victim to a virus or malware. iOS has seen its fair share of issues, but Apple tends to resolve these issues incredibly quickly, and they can push out updates to their devices incredibly quickly, whereas with Android, if a security issue is resolved, an update may not be able to go out to end users as quickly as with iOS.

In the end, both operating systems offer different user experiences, each with their own pros and cons. However, in terms of security, iOS seems to be the better choice. So if you are basing your next smartphone purchase solely on security, go for an iPhone.

It feels as though every week I am writing about technology and how it is improving our lives. With that being said, I am returning with yet another piece on technology for security. This time, I will be going over a few of the best, high-tech security gadgets that you can use to improve the security of your home.

LG’s Smart Security Wireless Camera

One of the world’s most popular electronics manufacturers has entered the realm of home security. The LG Smart Security Wireless Camera is an amazing way to monitor your household at an affordable price. Coming in at $199, the 5MP camera features a 130 degree lens and the ability to connect to your home’s Wi-Fi. With this connection, you can access the camera anytime, anywhere and get a live feed of your house. The camera is also compatible with the 24/7 ADT Canopy security service, where ADT will send authorities to your household should an alert arise.

Master Lock Bluetooth Padlock

As I’ve mentioned in previous blogs, the lock and key are ancient security methods, and are quickly becoming obsolete due to biometrics. However, Master Lock has found a way to keep up with the times. The Master Lock Bluetooth padlock is a blend of traditional padlock security with new-age Bluetooth technology. Instead of a key, this padlock requires a recognized bluetooth device, specifically a smartphone. All you have to do is place the smartphone near the lock, tap on the lock’s center button and you’re in. And if you do not have your phone on you, you can unlock the padlock with a simple directional code. And if you are not present to unlock the device, but need to anyways, you can unlock it remotely, via the Master Lock app.

Kwikset Premis

The Master Lock Bluetooth padlock is fine for locking sheds or cabinets, but what about your front door? Certainly you wouldn’t lock the front door of your house with a padlock, no matter how technologically advanced it is. The Kwikset Premis blends a top-notch, traditional deadbolt lock with the latest in technology. Not only does the lock feature an LED touchpad with a number combination, it also connects to your smartphone via bluetooth or Wi-Fi and can be controlled via your smartphone. And since it uses Apple’s HomeKit software, it can be controlled with Apple’s voice assistant Siri. This is certainly a must-have for tech lovers.

Technology is all around us; this is not new information. Smartphones, tablets, smart tvs, self-driving cars, drones, the list goes on and on. One of the newest sectors of technology to have risen in popularity as of late is biometrics. Now, if you aren’t technologically savvy, you may be asking yourself, “What in the world is biometrics?” That’s a great question. I figured that I would go through and provide a brief overview of this fascinating and, somewhat, new technology.

Firstly, I would like to point out that if you have a smartphone that was released in the last four years, you probably use biometrics every single day of your life. That fingerprint scanner on your smartphone, that’s biometrics; or at least, it’s one facet of biometrics.

In layman’s terms, biometrics is the combination of statistical data and human characteristics. Biometric authentication is when human characteristics — fingerprint, voice, face, etc. — are used to identify and authenticate certain information.

But why am I talking about it? Because it is one of the most secure methods of storing and accessing your information. Passwords, locks and keys and other traditional forms of security have served our society well for the last several millennia, but with an ever changing world that is constantly being updated with technology, it was only a matter of time before our security methods were updated as well.

Biometric authentication is still relatively new technology when compared to the lock and key, but it is already being applied in several situations. As previously mentioned, almost all modern smartphones contain a fingerprint scanner. Other phones include more advanced methods of biometric authentication, such as facial recognition technology. Amusement parks like Walt Disney World use biometrics in the form of fingerprint scanners to ensure that visitors are using the appropriate tickets. Even airports are beginning to use cutting edge technology for authentication and security, ranging from standard fingerprint scanners to much more intrusive implanted chips.

Some even believe that this technology will completely replace traditional passwords altogether. As someone who believes first and foremost in the security of others, I appreciate this technology. If it can be implemented in a way that protects our society from malicious hackers, then I fully support it.

]]>Beware the (Mac) Ransomwarehttp://stevenandiloro.com/beware-the-mac-ransomware/
Thu, 15 Jun 2017 15:00:22 +0000http://stevenandiloro.com/?p=169There is no question that Apple has become one of the most influential companies of all time. Its tech products have captivated the world and even changed it. The iPod changed the way we listen to music, the iPhone changed the way we communicate and use our phones, and the Apple Watch is changing the way we tell time. One of Apple’s most iconic products is its line of Macs, or its computers. And although the majority of the world uses Windows-based PCs instead of Mac-based computers, Apple’s computers are revered for their premium quality, cutting edge internals, and easy-to-use software. One major benefit of the Mac software, known as MacOS, is the claim that Macs are not susceptible to viruses. But is this absolutely true?

Recently, malware has become a clear and present danger to the majority of the world, what with the recent WannaCry ransomware attack that recently hit across the globe. And apparently hackers are riding the ransomware train because they have now centered their attacks on MacOS.

For those that do not know, ransomware is a type of malware or virus that holds your computer “hostage.” Essentially, your computer will be locked up and you will not be able to gain control until you pay the hackers a ransom. It is an incredibly devious plan, and it is one of the most popular forms of malware out there today.

According to a report from International Business Times, the new ransomware attacks are specifically designed to target Macs because of the lack of viruses targeted towards Mac users. The first form of the malware, MacSpy, includes the ability to log keystrokes and take a screenshot of the user’s desktop every 30 seconds. The second, more advanced form of the malware is the actual ransomware, appropriately titled MacRansom.

Obviously, while Macs tend to be virus-free because of Apple’s proprietary nature, they are not necessarily impervious. While there are not official numbers of how many Mac users have fallen victim to these new attacks, it is safe to assume that the number will be quite hefty. However, there is a light at the end of the tunnel. The aforementioned report claims that the attack is not as robust as Windows-based attacks, which could make the virus much easier to manage and remove.

Regardless, if you are a Mac user and believe that you are untouchable, this is not true. Please take caution and protect your personal information.

]]>What is Eero?http://stevenandiloro.com/what-is-eero/
Wed, 14 Jun 2017 17:00:32 +0000http://stevenandiloro.com/?p=166I’ve mentioned before that we are in the midst of a digital revolution. The Internet is a requirement and technology is all around us. Because of this dependence on technology, we have placed all of our personal information in a medium that is not always as secure as it may seem. And it is incredibly important to protect that information, now more than ever. Recent startup Eero understands this.

Eero is a startup focused on wireless networking. Essentially, the company focuses on creating products that allow for the transference of wireless networks so that users can access the Internet. The startup has a large focus on speed and efficiency. The hardware that the startup offers is easy to setup and is designed to be added upon, allowing for convenient network boosting. And, according to an article from TechCrunch, Eero knows that in order to attain the speed and efficiency that its customers desire, they must have a safe and secure network.

The company recently announced their newest hardware products, the new Eero Base Station and the new Eero Beacon. The Base Station is the router and primary source for connectivity, while the Beacon acts as a network extender, allowing Wi-Fi connectivity to have a farther reach. But the true highlight of Eero’s announcement is the introduction of its new security service, Eero Plus. The new service blocks botnets and protects users from a variety of threats, like phishing or ransomware attacks. But it doesn’t end there; Eero Plus also allows users to have complete control over what content can be accessed on their network, and includes increased parental controls. The service offers all of these useful features for only $99 per year, or $9 per month.

Technology is part of our lives, period, and it isn’t going anywhere. I understand its importance and role in society, but technology can not be put before our personal security. Companies like Eero that offer such intense security features are certainly welcome additions to the tech world and can offer a bit of comfort to those worried about their information.

Hopefully Eero will find tremendous success in the market and become a necessity for secure networking.

]]>Microsoft’s Security Team Has Had a Hectic Weekhttp://stevenandiloro.com/microsofts-security-team-has-had-a-hectic-week/
Mon, 22 May 2017 15:00:50 +0000http://stevenandiloro.com/?p=120Prior to the ongoing ransomware attack, security researcher Travis Ormandy took to Twitter on May 6 to reveal that he and a partner had found a detrimental flaw in Microsoft’s Windows operating system — one that was, in his words, “crazy bad.”

Upon receiving this report, the Microsoft security team launched into action, spending the entire weekend developing a patch that would reverse the scripting vulnerability. The patch was released on Monday, along with a list of programs that were affected by the security breach, including: Microsoft Forefront Endpoint Protection 2010, Microsoft Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, and more.

Additionally, Microsoft revealed that this flaw was so extensive that it would have allowed hackers to directly disengage Windows Defender, the antivirus software that is built directly into the Windows operating system. The affected versions of Windows Defender included those built into Windows 7, 8.1, and 10.

By weakening this defense, hackers had the ability to take control of devices without any direct access or even having to lure users into either opening an infected email or visiting a malicious website — two mistakes that are typically remedied by Windows Defender. Instead, a hacker would simply have to send an email ridden with infected files or a compromised chat message in order to breach the system. Therefore, all Windows users with an email inbox were at risk.

Although Microsoft developed a patch so quickly that Ormandy offered them endless “kudos,” it is not impossible for such a lapse in security to happen again. After all, antivirus programs are just as susceptible to failure as any other form of technology — a fact that has been exemplified by the recent issues with McAfee and FireEye, as well as the release of the “DoubleAgent attack” that turns antivirus software into malware. Luckily, this particular incident did not escalate to such a degree, seeing as the flaw was repaired before it could even be discovered or exploited by hackers. However, users should still remain vigilant and beware of any suspicious looking emails or files, as their antivirus program could still be vulnerable to attacks.

]]>The World’s Biggest Cyber Attackhttp://stevenandiloro.com/the-worlds-biggest-cyber-attack/
Mon, 15 May 2017 22:44:56 +0000http://stevenandiloro.com/?p=116In a previous article of mine, I’ve explained how terrible ransomware attacks can be. In that same article, I mentioned the recent popularity that these attacks have seen in the past year or so, with over 600 million attacks in 2016 alone. It was only a matter of time before a breaking point was reached. And that day has come.

On Friday, May 12th, a ransomware attack was executed across the globe. Over 150 countries fell victim to the attack, making it the largest cyberattack in history.

Dubbed “WannaCry,” the attack was far worse than a traditional ransomware attack. Instead of targeting everyday civilians, WannaCry aimed solely for businesses, governments and public services.

In China, several colleges were hit by the attack, locking multiple students out of their computers. Gas stations also fell victim to the attack, shutting down computers and registers, thus forcing customers to use cash. Russia’s Central Bank was also affected by the attack; luckily, sources indicate that customer information has not been accessed. The United Kingdom’s National Health Service probably received the worst of the attack. While representatives of the health service claim that patient information has not been breached, they have admitted to multiple hospitals having had to cancel outpatient appointments.

Even global delivery service company Federal Express (FedEx) has fallen prey to the cyber hackers. While the company claims that they merely suffered minor interference, it is still worrisome to know that an attack of this scale can be executed.

According to a report from Time, the virus was not actually able to lock any computer and demand a ransom before unlocking, however, next time we may not be so lucky.

“We haven’t fully dodged this bullet at all until we’re patched against the vulnerability itself,” said Ryan Kalember, senior vice president of Proofpoint Inc., the company that assisted in ending the attacks.

What makes the situation even more nerve wracking is the lack of a culprit. Obviously, this is an incredibly serious crime, and those responsible should and will face severe consequences. However, until they are found and brought the justice, we must remain vigilant and safe. I cannot overstress the importance of proper malware protection. I will be sure to update with any developments.

]]>3 Best DIY Home Security Systemshttp://stevenandiloro.com/3-best-diy-home-security-systems/
Fri, 05 May 2017 16:37:27 +0000http://stevenandiloro.com/?p=101Nothing is more important than making sure you and your family feel safe when at home. There are many companies that want to provide that safety for everyone, however, it can come with high installation price. Luckily, almost every industry has become equipped with DIY (do it yourself) tools at more affordable prices. When taking a look at at a DIY home system, it is important to review which ones will satisfy your security needs. Here are three companies I believe, have done a spectacular job at giving consumers security they can set-up themselves.

Abode Starter Kit

This reasonably priced security system is great for unfamiliar or first-time users of technology systems. The kit includes; a hub to connect all your smart devices, a camera, a motion detector, 2 door/window sensors, and a key fob. The kit also has the capability to add live stream videos, water leak sensors, or garage door openers for additional fees. A review from Cnet says it best, sharing that the ability to start out simple and continue to include resources as you go is the best feature of this system. Another beneficial feature of the Abode is its capability to sync with Alexa in order to command security tasks by voice. With its endless options regarding self-monitoring and smart house capabilities, this structure is ideal for any size home.

Nest Cam

For those looking to simply keep an eye on their house, this small camera is a perfect choice. With an easy setup process, this device gives users the ability to monitor their pets, or even just check-in on their house whenever they please. Similar to the Abode, the Nest Cam offers some opportunities to branch into additional features. One reviewer gave a glance into the high-quality picture the camera provides, as well the extremely useful wide-angle lens. For those wanting to use Nest to observe pet activity, they will be pleasantly surprised when they can talk to their animals through the two-way sound exchange.

Kuna Toucan

For those more interested in the happenings outside of their home, the Kuna Toucan is the best model currently on the market. Adapting from the already existent Kouna Light Fixture that built the camera into the outdoor sconces, the Toucan provides users with moveable outdoor security vision. The device includes a wide-view lens, high definition image, as well as a loud decibel siren. With capabilities ranging from controlling light fixtures connected to the device, to live streaming abilities this outdoor security system is an extremely straightforward product with optimal results.
When it comes to home security it is important to find a company or device that best suits the need of the home in which it will be installed. The era of DIY has brought about many technologies that allow consumers to easily create a safe environment for themselves. I would definitely suggest checking out one of these security systems if you are interested in setting one up yourself.

]]>Fooling Your Fingerprinthttp://stevenandiloro.com/fooling-your-fingerprint/
Thu, 13 Apr 2017 00:44:50 +0000http://stevenandiloro.com/?p=96Our personal information is incredibly important to us. In a world where a large majority of our personal information is available for anyone to view online, we can take solace in knowing that we can still store our most private memories and data in our smartphones. Until now. Recent reports claim that the fingerprint sensors on several popular smartphones are not as secure as we once believed.

Made popular by Apple’s iPhone 5S, the fingerprint scanner made what was once thought to be mere science fiction a reality. Today’s smartphone fingerprint scanner works by scanning a previously stored fingerprint and unlocking the smartphone at a moment’s notice. It added a much needed layer of security that left consumers feeling more secure about their personal information.

Unfortunately, the scanners can be easily tricked. A recent report from The New York Times, claims that researchers from New York University and Michigan State University can be bypassed by faux fingerprints. These fake prints are in essence a digital collage of common attributes found in fingerprints. The studies found that a series of “Master Prints” created by the researchers fooled the smartphone’s fingerprint scanners a whopping 65% of the time.

When asked by the Times as to whether or not consumers should worry, Apple stated that the chances of a false scan occurring are 1 in 50,000. The multibillion dollar company even claims that they had tested for false scans when developing their Touch ID system.

What makes the situation even more frightening is the sheer amount of information kept in our smartphones. Not only do we keep our photos, personal files and passwords tucked neatly in our phones, some of us even use the popular Apple Pay, Samsung Pay, or Android Pay feature, which stores your credit card information directly on the phone. If a hacker can manage to weasel their way into your device, all of that information is at risk.

However, some researchers claim that the findings may not necessarily be reason to panic, yet. In the article, Andy Adler, a professor at Carleton University in Canada stated, “It’s almost certainly not as worrisome as presented, but it’s almost certainly pretty darn bad.” My advice to any of you out there worried about hackers getting into your most sensitive data, would be to remove the fingerprint functionality altogether. Stick with the traditional method of typing a password.